Yu Watanabe
e4b127e2cc
meson: do not link with libudev
2020-12-16 02:31:44 +09:00
Yu Watanabe
0d5eb02134
Merge pull request #17478 from yuwata/split-network-internal
...
libsystemd-network: split network-internal.c
2020-11-27 09:04:19 +09:00
Yu Watanabe
db9ecf0501
license: LGPL-2.1+ -> LGPL-2.1-or-later
2020-11-09 13:23:58 +09:00
Yu, Li-Yu
c32d562da5
udev: add fuzzer for udev_rule_parse_value
2020-10-29 20:19:29 +08:00
Yu Watanabe
26f4d32365
meson: drop libsystemd_network from several binaries
...
This reduces the size of udevadm:
Before:
```
$ ll udevadm
-rwxrwxr-x 1 watanabe watanabe 1203800 Oct 29 01:36 udevadm
```
After:
```
$ ll udevadm
-rwxrwxr-x 1 watanabe watanabe 1094384 Oct 29 01:38 udevadm
```
2020-10-29 14:23:49 +09:00
Benjamin Berg
2ad7597e44
fuzz: Add an XDG desktop file fuzzer
...
To test the XDG parser used by the xdg-autostart-generator.
Co-authored-by: Evgeny Vereshchagin <evvers@ya.ru>
2020-05-27 09:02:10 +02:00
Yu Watanabe
9648956d1f
test: move {test,fuzz}-fido-id-desc.c into src/udev/fido_id
2019-10-31 10:37:42 +09:00
Fabian Henneke
d45ee2f31a
udev: Add id program and rule for FIDO security tokens
...
Add a fido_id program meant to be run for devices in the hidraw
subsystem via an IMPORT directive. The program parses the HID report
descriptor and assigns the ID_SECURITY_TOKEN environment variable if a
declared usage matches the FIDO_CTAPHID_USAGE declared in the FIDO CTAP
specification. This replaces the previous approach of whitelisting all
known security token models manually.
This commit is accompanied by a test suite and a fuzzer target for the
descriptor parsing routine.
Fixes : #11996 .
2019-09-07 02:23:58 +09:00
Lennart Poettering
d768467563
fuzzer: add varlink fuzzer
2019-05-09 14:14:20 -04:00
Franck Bui
9f3f596477
meson: make source files including nspawn-settings.h depend on libseccomp
...
Since nspawn-settings.h includes seccomp.h, any file that includes
nspawn-settings.h should depend on libseccomp so the correct header path where
seccomp.h lives is added to the header search paths.
It's especially important for distros such as openSUSE where seccomp.h is not
shipped in /usr/include but /usr/include/libseccomp.
This patch is similar to 8238423095
.
2019-04-30 19:31:22 +02:00
Zbigniew Jędrzejewski-Szmek
9ddd62cda1
fuzz-nspawn-oci: add fuzzer for the oci bundle loader
2019-03-22 11:09:52 +01:00
Frantisek Sumsal
55a365cb74
fuzz: add a fuzzer for time utils
2019-03-12 12:04:25 +01:00
Frantisek Sumsal
415b3f0bb2
fuzz: add a fuzzer for calendarspec
2019-03-12 11:57:09 +01:00
Frantisek Sumsal
b5b499b32c
fuzz: add nspawn-settings fuzzer
2019-03-11 14:13:00 +01:00
Frantisek Sumsal
04ddab1462
fuzz: add hostname-util fuzzer
2019-03-11 14:12:06 +01:00
Frantisek Sumsal
18d51b4509
fuzz: add env-file fuzzer
2019-03-11 14:11:28 +01:00
Frantisek Sumsal
e5f274bee1
fuzz: add bus-label fuzzer
2019-03-11 13:00:32 +01:00
Yu Watanabe
4c9024c2cf
fuzz: add fuzzer for udev database
2019-02-26 13:10:31 +09:00
Evgeny Vereshchagin
2e646cbed8
tests: add a fuzzer for the udev rules parser ( #10929 )
2018-11-26 18:14:30 +09:00
Evgeny Vereshchagin
a4aa59bae2
tests: add a fuzzer for server_process_native_file
2018-11-23 17:29:59 +01:00
Evgeny Vereshchagin
4928e8adba
tests: add a fuzzer for catalog_import_file
2018-11-22 21:02:34 +01:00
Evgeny Vereshchagin
9541f5ff5c
tests: add a fuzzer for journald streams
2018-11-20 03:03:32 +01:00
Evgeny Vereshchagin
ed62712dc6
tests: introduce dummy_server_init and use it in all journald fuzzers
2018-11-17 13:02:26 +01:00
Evgeny Vereshchagin
090a20cfaf
tests: add a fuzzer for process_audit_string
2018-11-16 23:14:31 +01:00
Evgeny Vereshchagin
8857fb9beb
tests: add a fuzzer for dev_kmsg_record
2018-11-16 08:44:35 +01:00
Lennart Poettering
8cb17a64c4
Merge pull request #10563 from keszybz/lz4-quickfix-quickfix
...
journal: adapt for new improved LZ4_decompress_safe_partial()
2018-10-30 14:51:55 +01:00
Zbigniew Jędrzejewski-Szmek
029427043b
fuzz-compress: add fuzzer for compression and decompression
2018-10-30 11:04:53 +01:00
Evgeny Vereshchagin
28ffcec2cb
tests: add an lldp fuzzer
...
I went through my antique collection of fuzzers the other day
to see which ones I hadn't sent upstream yet. This one
seems to be nice to have and ready to be merged. As far as I can
tell, it hasn't managed to find anything useful yet,
but it's better to be safe than sorry especially when it comes to networking
code :-)
2018-10-29 15:24:16 +00:00
Evgeny Vereshchagin
6315d12bba
tests: add a fuzzer for the json parser and dumper
2018-10-10 10:13:30 +02:00
Zbigniew Jędrzejewski-Szmek
56b560c263
fuzz-bus-message: add fuzzer for message parsing
...
As with other fuzzers, SYSTEMD_FUZZ_OUTPUT=1 and SYSTEMD_LOG_LEVEL=debug can be
used for debugging.
2018-10-02 11:09:05 +02:00
Evgeny Vereshchagin
d89a400ed6
fuzz: add a fuzzer for dhcp6_client
2018-09-29 02:27:07 +00:00
Evgeny Vereshchagin
0f0a1dad7d
tests: add a fuzzer for sd-ndisc
2018-09-26 16:39:03 +00:00
Evgeny Vereshchagin
231dca5579
tests: put fuzz_journald_processing_function in a .c file
2018-09-08 12:05:14 +02:00
Evgeny Vereshchagin
9cdea02db5
tests: add a fuzzer for server_process_native_message
2018-09-03 07:16:52 +00:00
Evgeny Vereshchagin
a70f343cac
tests: add a rudimentary fuzzer for server_process_syslog_message ( #9979 )
2018-09-03 12:18:26 +09:00
Zbigniew Jędrzejewski-Szmek
d9b02e1697
tree-wide: drop copyright headers from frequent contributors
...
Fixes #9320 .
for p in Shapovalov Chevalier Rozhkov Sievers Mack Herrmann Schmidt Rudenberg Sahani Landden Andersen Watanabe; do
git grep -e 'Copyright.*'$p -l|xargs perl -i -0pe 's|/([*][*])?[*]\s+([*#]\s+)?Copyright[^\n]*'$p'[^\n]*\s*[*]([*][*])?/\n*|\n|gms; s|\s+([*#]\s+)?Copyright[^\n]*'$p'[^\n]*\n*|\n|gms'
done
2018-06-20 11:58:53 +02:00
Lennart Poettering
96b2fb93c5
tree-wide: beautify remaining copyright statements
...
Let's unify an beautify our remaining copyright statements, with a
unicode ©. This means our copyright statements are now always formatted
the same way. Yay.
2018-06-14 10:20:21 +02:00
Zbigniew Jędrzejewski-Szmek
a38f7fec44
fuzz-journal-remote: a fuzzer for journal-remote over-the-wire input
2018-05-31 13:04:18 +02:00
Zbigniew Jędrzejewski-Szmek
11a1589223
tree-wide: drop license boilerplate
...
Files which are installed as-is (any .service and other unit files, .conf
files, .policy files, etc), are left as is. My assumption is that SPDX
identifiers are not yet that well known, so it's better to retain the
extended header to avoid any doubt.
I also kept any copyright lines. We can probably remove them, but it'd nice to
obtain explicit acks from all involved authors before doing that.
2018-04-06 18:58:55 +02:00
Zbigniew Jędrzejewski-Szmek
ec7a02ea54
Add fuzzer for unit file parser
2018-03-11 16:33:59 +01:00
Jonathan Rudenberg
2bd37c5be2
fuzz: add DHCP server fuzzer
2018-01-19 21:48:14 -05:00
Jonathan Rudenberg
7db7d5b733
fuzz: add initial fuzzing infrastructure
...
The fuzzers will be used by oss-fuzz to automatically and
continuously fuzz systemd.
This commit includes the build tooling necessary to build fuzz
targets, and a fuzzer for the DNS packet parser.
2018-01-17 13:57:06 -05:00